Case study- handmade furniture ltd

Assignment Help Computer Networking
Reference no: EM13754785 , Length: 2500 Words

Assignment case study: HandMade Furniture Ltd.

This case study provides background information for both assignment 1 and assignment 2.

As a network consultant, your initial examination of the company has discovered the following facts:

1. It is a single site company with a factory and office on site.

a. There are 80 employees in total, 60 in the factory and 20 in the office.
b. Each office worker has their own PC. There is a mixture of Windows XP, Windows 7 and Windows 8 installed together with various versions of Microsoft Office.
c. There are 8 PCs in the factory, all running Windows 7 and Microsoft Office 2010.
d. There is no central subscription to anti-virus software. Staff are left to do this themselves.

2. The network is completely wired and they have not yet started to explore the use of Wi-Fi. If staff bring their own devices to work, they need to make their own provision for Internet access (3G etc.)

3. The network runs on a single Windows Server 2012 server. There is an additional NAS storage device that will store up 10TB of data. There is no formal backup plan; again staff (and individual teams) are expected to manage their own data. Some do this better than others. For example, the design team have their own NAS storage and additionally copy designs to backup DVD on a weekly basis.

4. Internet access is provided through an ADSL account with a local Internet rovider. This gives a maximum of 4.5 Mbit/s of bandwidth. They have found that this is not sufficient for their needs.

a. The company does not have a website.
b. There is a single email address for the company that the MD (Managing Director) and her PA (Personal Assistant) have access to.
c. Other staff have set up ‘unofficial' company emails for their requirements; for example, the finance team have a shared email address with a Gmail account that they use for ordering.

5. No single person has responsibility to managing the network. A previous office manager (who has now left) had some IT experience and supported the network as part of his job. There have been some serious incidents recently, most notably a serious virus infection that was dealt with by bringing in a local IT technician to clean a number of PCs

6. The arrangements for printing are very mixed: a. There is a single inkjet printer in the factory shared between the factory PCs. This printer is networked. b. In the office, there is a high volume laser printer connected directly to one of the admin support team’s PCs. This is connected via Windows printer sharing to the other PCs in the admin team but no-one else has access (in the past, if anyone else needed a large number of documents printing they had to email it to a member of the support team). c. The remainder of the office staff use 22 inkjet printers, from a variety of manufacturers. Some of these are connected to individual PCs and some are shared between workgroups. These have been bought over the past few years on an ad-hoc basis; responsibility for their upkeep is usually shared by the members of that workgroup.

Assignment 1:

You are a self-employed Network Consultant and you have been approached by a small furniture manufacturer (HandMade Furniture Ltd.) to examine their network.

Your initial findings have determined that the network is currently working within acceptable parameters but you can see that there will be problems in the future unless they implement some additional infrastructure and a management plan in the very near future.
The Managing Director has asked you to produce a briefing paper to be presented to the Board. This should be written as a fully referenced formal report.

Assignment 2:

This assignment requires you to create a network management plan and a security plan for HandMade Furniture Ltd. that will include both local and cloud-based services.

This is based on the same company case study that you used for assignment 1, but with the following additional information:

1. A decision has been made to upgrade the company Internet connection. Your advice will be appreciated on how this should be done.

2. The company have decided to upgrade all PCs to the latest versions of Microsoft Office and Windows.

3. Email addresses will be provided for all staff via Google Apps for Business

4. Wi-Fi will be added to the network and team leaders in the factory will be issued with

a Wi-Fi enabled laptop.

5. Staff will be able to bring their own devices to work and connect to the work Wi-Fi network. Advice on how to do this will be appreciated.

6. The company are considering moving away from individual printers to networked ‘pull' printing. They would appreciate your advice on the implications of this.

7. The company has decided to move their accounting and stock control systems to a cloud based service, managed and maintained by another company. The provider has a good international reputation, however the board would appreciate you advice on this.

  • Word Limit for Both Assignments: 2500
  • References Required
  • Please provide solution for both assignments in saparate word document.

Verified Expert

Solution discussed about Company network plan and given solution.It contain 1500 words. Assig 2 contain 900 words and discussed about the network plan and security plan for local network and cloud based network service. Both solution has APA reference style.

Reference no: EM13754785

Questions Cloud

What did the anti-federalists fear about government : What did the anti-federalists fear about government?
How information systems affect business careers : Explain how information systems transform business operations of your selected business. Investigate how information systems affect business careers and what information systems skills and knowledge are essential
Demonstrate the role of nationalism in the rhetoric : Demonstrate the role of nationalism in the rhetoric of political leaders. Explain how the economy that emerged during the Industrial Revolution led to political shifts across the globe.
Nap to reduce security risks : You discover that many of your company's customers have been responsible for introducing viruses and malware into the company network via the Internet
Case study- handmade furniture ltd : Assignment case study: HandMade Furniture Ltd. Each office worker has their own PC. There is a mixture of Windows XP, Windows 7 and Windows 8 installed together with various versions of Microsoft Office
Count the occurrences of words in a songs lyrics : Count the Occurrences of words in a song's lyrics, State the approach you will use if you get a hard copy of a song's lyrics.
Compare donatellos and michelangelos david : compare Donatellos and Michelangelos David, Florence Cathedral Dome and Hagia Sophia and Tintoretto's Last Supper and DaVinci's Last Supper.
Limitations of financial ratios : Referencing this week's readings and lecture, what are the limitations of financial ratios? Classify your answer into at least the following categories: liquidity ratios, activity ratios, leverage ratios, and profitability ratios.
Identify critical causes that produced political conflict : identify the critical causes that produced political conflict in the Mexican

Reviews

Write a Review

Computer Networking Questions & Answers

  Your boss has just heard about several me nefarious

your boss has just heard about some nefarious computer activities called ping sweeps and port scans. he wants to know

  Expiration and garbage collection timersare

Router X does not receive any update for another 90s.  How many periodic, expiration and garbage collection timersare now running in router X?

  Describe what happens in getting this request message

Describe what happens in getting this request message to the server and how the server gets the response message back to the client.

  Research a metro ethernet service

Research a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesn't have Metro Ethernet).

  Threat, risk and vulnerability

Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.

  What settings might be considered via group policy

What technology will be implemented to provide secure remote access for users and who should have remote access?

  Identifies nesess new network requirements

You are asked to produce a report that identifies NESES's new network requirements. You should suggest a network solution that demonstrates the appropriateness and suitability of your design.

  Identify the specific manufacture and model

Evaluate the quality of each in terms of print speed (i.e., pages per minute), resolution (i.e., dots per inch), memory, color capability, duplex printing capability, cartridge price, cartridge printing capacity, and longevity.

  You are the network engineer contracted to established the

you are the network engineer contracted to established a wan connectivity between two office locations for a local

  Wide area network by using frame relay technology

Site networks are connected to form wide area network using frame relay technology. Webservers located at each site provide access to information resources.

  Question about tcp networking

A TCP entity in Host 1 receives a section from a corresponding TCP entity in Host 3. The received section has the following header field values se

  Explaining telecommunications asset life cycle model

Explain in scholarly detail role of telecommunications operations functions in Telecommunications Asset Life Cycle Model concept?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd